Hooking COM Objects: Intercepting Calls to COM Interfaces
The two main approaches to COM intercepting hooks are described and discussed
The two main approaches to COM intercepting hooks are described and discussed
In this article, Iโm going to tell you something about the Clipboard internals by showing how you can forbid access to it.
This article describes how to detect newly plugged and unplugged devices in the user-mode application while it's running
In this article, we will describe the method to perform user mode region monitoring of the specified window.
This article is devoted to the development of the key licensing system for the applications.
The aim of this article is to create the library for writing e-mail messages in the *.pst format (used by Microsoft Outlook) to the file.
This article shows how to use FTDI API to interact with the devices, which have FTDI chip within. The basic API set necessary for common operations is...
This article describes a sample parser of reg files using the Boost Spirit Parser Framework.
To create this tool I`ve taken Microsoft Platform SDK sample (Program Files\Microsoft Platform SDK\Samples\NetDS\WinSock\LSP\) and implemented some ad...
The Simple SST Unhooker article represents the method of solving the problem of substitution of function address in the SST table - to hide processes...
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.